How to utilize SEP 12.1 for Incident Response - PART 5
This article is the fifth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous four are below:How to utilize SEP 12.1 for Incident...
View ArticleBackup Exec 2014 Technical White Paper - Private Cloud Services
The series of Technical White Papers we are currently publishing are updated papers on the release of Backup Exec 2014. They are designed to introduce Symantec partners and end users to key...
View ArticleFull System Recovery of Unix/Linux client without BMR
A Full Unix/Linux client recovery from a backup image requires setting up a recovery environment on the target client hardware specifically for the activity. Overwriting system files on a running...
View ArticleIntroduction to SMG Components and Add SMG Scanner into Control Center
Symantec Messaging Gateway software consists of the following subcomponents:ScannerControl CenterScanners do the following tasks:Process the inbound messages and outbound messages and route messages...
View ArticleVision Symposium Munich - Keynote Presentations
Please click on a keynote speaker below to download his presentation.Travis GrandpreStefan HenkePiero DepaoliIan WoodTom SchroederStefan SieberMichael PiontekMark NuttChandra Rangan
View ArticleVision Symposium Munich - Breakout Sessions
Please click on a sesion title below to download the presentation.Netbackup AppliancesBest Practices Reference Architecture Virtual and CloudData Center Security & Control Compliance...
View ArticleVision Symposium Munich - Channel Day Breakout Sessions
Please click on the session title below to download the presentation. Archiving and eDiscoveryBackup Exec 2014BrandingData InsightDCS ComplianceEndpointEnterprise Vault and Information...
View ArticleSymantec Backup Exec 2014 Blueprints - Agent for Windows
Businesses need to protect a broad range of information, generated in a plethora of ways, through multiple applications used by billions of individuals around the world. Organisations not only need to...
View ArticleSymantec Backup Exec 2014 Blueprint - Deduplication
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints".These Blueprints are designed to show backup and recovery challenges around specific...
View ArticleSymantec App Center Remote IDP Login failed
Recently I found out a issue in app center and I think sharing this info would help others.When trying to login using credentials (remote IDP) some users can login and some users can't. Further...
View ArticleUsing TaskManagement with ScheduleTaskCustom
Ever tried to schedule a task using ASDK which should repeat but not every day? It is not easy but it works...Here the is what the help says about custom schedule. Using the following...
View ArticleSymantec Endpoint Protection Manager's executable batch files
Hello,If not able to start any of the following wizard through navigation path, alternately can attempt to start by executing batch files directly.Database Backup & Restore Wizard Migration...
View ArticleDeploy the Data Loss Prevention 12.5 (DLP) Agent using Software Management...
The challenge with SMP 7.5 is that the DLP agent is no longer an integrated agent component or plug-in to the Symantec Management Agent (refer to the KB article HOWTO92275:...
View ArticleMatching Network Cards & Drivers
When imaging across a network, the preboot operating system require drivers to make use of the machine's network card. One of the most common issues with Ghost Solution Suite and Deployment Solution is...
View ArticleHow to quickly check client SMA logs and manage client within SMP Console
How to check Symantec Management Agent logs of client computer (and other things to do), within SMP Console using Real Time System Management solution Case:Very often we need to perform analyze of logs...
View ArticleSpotlight on the Inventory Rule Management web-service operations
Inventory rules (also known as detection rules) are used on Managed Deliveries to ensure a software release (or SP or update) is applicable or installed.The feature was introduce in the 6.2 version of...
View ArticleIntroduce NetBackup Accelerator
Accelerator is a new feature added into NetBackup since 7.5, it can significantly reduce time required for full backups of file systems and VMware.Below some slides to introduce Accelerator and its...
View ArticleAccelerator Process flow
Accelerator is a new feature added into NetBackup since 7.5, it can significantly reduce time required for full backups of file systems and VMware.Below some slides to compare the process flow from a...
View ArticleNetbackup for MySQL
I have gone through distinct options we have for MySQL backup with Netbackup. Although we do not have any direct Netbackup agent for MySQL, BUT MySQL backup integration with Netbackup achievable via 2...
View ArticleHow intelligent are Intelligent Policies?
VMware Intelligent Policies, or VIP, was introduced in NetBackup 7.1. VIP allows a NetBackup Administrator to discover new VMware virtual machines and automatically add them to backups. For more...
View Article